Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1836089.1836105acmotherconferencesArticle/Chapter ViewAbstractPublication PagesppdpConference Proceedingsconference-collections
research-article

Rewrite-based verification of XML updates

Published: 26 July 2010 Publication History

Abstract

We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree language L as the first child of a node labeled by a". For these rules, we give type inference algorithms, considering types defined by several classes of unranked tree automata. These type inference algorithms are directly applicable to XML static typechecking, which is the problem of verifying whether, a given document transformation always converts source documents of a given input type into documents of a given output type. We show that typechecking for arbitrary sequences of XML update primitives can be done in polynomial time when the unranked tree automaton defining the output type is deterministic and complete, and that it is EXPTIME-complete otherwise.
We then apply the results to the verification of access control policies for XML updates. We propose in particular a polynomial time algorithm for the problem of local consistency of a policy, that is, for deciding the non-existence of a sequence of authorized update operations starting from a given document that simulates a forbidden update operation.

References

[1]
S. Abiteboul, P. Bourhis, and B. Marinoiu. Satisfiability and relevance for queries over active documents. In Proceedings of the 28th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pages 87--96. ACM, 2009.
[2]
M. Benedikt and J. Cheney. Semantics, Types and Effects for XML Updates. In Proceedings of the 12th International Symposium, Database Programming Languages (DBPL), volume 5708 of LNCS, pages 1--17, Springer, 2009.
[3]
V. Benzaken, G. Castagna and A. Frisch. CDuce: an XML-centric general-purpose language. In Proceedings of the 8th ACM SIGPLAN International conference on Functional programming, pages 51--63, ACM, 2003.
[4]
A. Bouajjani, B. Jonsson, M. Nilsson, and T. Touili. Regular Model Checking. In Proceedings of the 12th Int. Conference on Computer Aided Verification (CAV), volume 1855 of LNCS, pages 403--418. Springer, 2000.
[5]
A. Bouajjani and T. Touili. On computing reachability sets of process rewrite systems. In Proceedings 16th International Conference Term Rewriting and Applications (RTA), volume 3467 of LNCS, pages 484--499. Springer, 2005.
[6]
L. Bravo, J. Cheney, and I. Fundulaki. ACCOn: Checking Consistency of XML Write-Access Control Policies. In Proceedings 11th International Conference on Extending Database Tech- nology (EDBT), volume 261 of ACM International Conference Proceeding Series, pages 715--719. ACM, 2008.
[7]
S. C. Lim and S. H. Son. Access Control of XML Documents Considering Update Operations. In Proceedings of ACM Workshop on XML Security, ACM, 2003.
[8]
D. Chamberlin and J. Robie. XQuery Update Facility 1.0. W3C Candidate Recommendation. http://www.w3.org/TR/ xquery-update-10/, 2009.
[9]
H. Comon, M. Dauchet, R. Gilleron, C. Löding, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree automata techniques and applications. Available on: http://tata. gforge.inria.fr/, 2007.
[10]
E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Securing XML Documents. In Proceedings of the 7th International Conference on Extending Database Technology (EDBT), volume 1777 of LNCS, pages 121--135. Springer, 2000.
[11]
N. Dershowitz and J. P. Jouannaud. Rewrite systems. In Handbook of Theoretical Computer Science (Vol. B: Formal Models and Semantics), pages 243--320, Amsterdam, North-Holland, 1990.
[12]
J. Engelfriet, S. Maneth, and H. Seidl. Deciding Equivalence of Top-Down XML Transformations in Polynomial Time. J. Comput. Syst. Sci., 75(5):271--286, 2009.
[13]
J. Engelfriet and H. Vogler. Macro Tree Transducers. J. Comp. Syst. Sci., 31:71--146, 1985.
[14]
W. Fan, C.-Y. Chan, and M. Garofalakis. Secure XML Querying with Security Views. In Proceedings of the 2004 ACM SIGMOD international conference on Management of data (SIGMOD), pages 587--598, ACM, 2004.
[15]
G. Feuillade, T. Genet, and V. Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. Journal of Automated Reasoning, 33 (3-4):341--383, 2004.
[16]
A. Frisch and H. Hosoya. Towards Practical Typechecking for Macro Tree Transducers. In Proceedings of the 11th International Symposium on Database Programming Languages (DBPL), volume 4797 of LNCS, pages 246--260. Springer, 2007.
[17]
I. Fundulaki and S. Maneth. Formalizing XML Access Control for Update Operations. In Proceedings of the 12th ACM symposium on Access control models and technologies (SACMAT), pages 169--174, ACM, 2007.
[18]
P. A. Gardner, G. D. Smith, M. J. Wheelhouse, and U. D. Zarfaty. Local Hoare Reasoning about DOM. In Proceedings of the 27th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pages 261--270, ACM, 2008.
[19]
T. Genet and V. Rusu. Equational approximations for tree automata completion. Journal of Symbolic Computation, 45 (5):574--597, 2010.
[20]
R. Gilleron. Decision problems for term rewrite systems and recognizable tree languages. In 8th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 480 of LNCS, pages 148--159, Springer, 1991.
[21]
F. Jacquemard and M. Rusinowitch. Closure of Hedge-Automata Languages by Hedge Rewriting. In Proceedings of the 19th International Conference on Rewriting Techniques and Applications (RTA), volume 5117 of LNCS, pages 157--171, Springer, 2008.
[22]
M. Kay. XSL Transformations (XSLT) 2.0. W3C working draft, World Wide Web Consortium, 2003. Available at http://www.w3.org/TR/xslt20.
[23]
C. Löding. Ground Tree Rewriting Graphs of Bounded Tree Width. In Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS), volume 2285 of LNCS, pages 559--570. Springer, 2002
[24]
C. Löding and A. Spelten. Transition Graphs of Rewriting Systems over Unranked Trees. In Proceedings 32nd International Symposium on Mathematical Foundations of Computer Sci- ence (MFCS) volume 4708 of LNCS, pages 67--77, Springer, 2007.
[25]
S. Maneth, A. Berlea, T. Perst, and H. Seidl. XML Type Checking with Macro Tree Transducers. In 24th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems (PODS), pages 283--294, ACM, 2005.
[26]
S. Maneth, T. Perst, and H. Seidl. Exact XML Type Checking in Polynomial Time. In Proceedings of the 11th International Conference on Database Theory (ICDT), volume 4353 of LNCS, pages 254--268, Springer, 2007.
[27]
W. Martens and F. Neven. Frontiers of Tractability for Typechecking Simple XML Transformations. In Proceedings of the Twenty-third ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), pages 23--34, ACM, 2004.
[28]
T. Milo, D. Suciu, and V. Vianu. Typechecking for XML Transformers. J. of Comp. Syst. Sci., 66(1):66--97, 2003.
[29]
N. Moore. The Halting Problem and Undecidability of Document Generation under Access Control for Tree Updates, In Proceedings of the 3d International Conference on Language and Automata Theory and Applications (LATA), volume 5457 of LNCS, pages 601--613, Springer, 2009.
[30]
M. Murata. "Hedge Automata: a Formal Model for XML Schemata". Web page, 2000.
[31]
M. Murata, D. Lee, and M. Mani. Taxonomy of XML Schema Languages using Formal Language Theory. In Extreme Markup Languages, 2000.
[32]
M. Murata, A. Tozawa, M. Kudo, and S. Hada. XML Access Control using Static Analysis. ACM Trans. Inf. Syst. Secur., 9(3):292--324, 2006.
[33]
H. Ohsaki, H. Seki, and T. Takai. Recognizing Boolean Closed A-tree languages with Membership Conditional Rewriting Mechanism. In Proc. of the 14th Int. Conference on Rewriting Techniques and Applications (RTA), volume 2706 of LNCS, pages 483--498. Springer, 2003.
[34]
T. Perst and H. Seidl. Macro Forest Transducers. Information Processing Letters, 89:141--149, 2004.
[35]
T. Schwentick. Automata for XML -- A Survey. J. Comput. Syst. Sci., 73(3):289--315, 2007.
[36]
H. Seidl. Deciding Equivalence of Finite Tree Automata. SIAM Journal of Computing, 19(3):424--437, 1990.
[37]
A. Spelten. Rewriting Systems over Unranked Trees. Master's thesis, Diplomarbeit, RWTH Aachen, 2006.
[38]
B. ten Cate. The Expressivity of XPath with Transitive Closure. In Proceedings of the 26th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), pages 328--337, ACM, 2006. ISBN 1-59593-318-2.
[39]
T. Touili. Computing Transitive Closures of Hedge Transformations. In In Proceedings of the 1st International Workshop on Verification and Evaluation of Computer and Communication Systems (VECOS), eWIC Series, British Computer Society, 2007.
[40]
A. Tozawa. Towards Static Type Checking for XSLT. In Proceedings of the 2001 ACM Symposium on Document engineering (DocEng), pages 18--27, ACM, 2001.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PPDP '10: Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming
July 2010
266 pages
ISBN:9781450301329
DOI:10.1145/1836089
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 July 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hedge automata
  2. static typechecking
  3. term rewriting
  4. xml access control policies
  5. xml updates

Qualifiers

  • Research-article

Conference

PPDP '10

Acceptance Rates

PPDP '10 Paper Acceptance Rate 21 of 57 submissions, 37%;
Overall Acceptance Rate 230 of 486 submissions, 47%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Validating XML document adaptations via Hedge Automata transformationsTheoretical Computer Science10.1016/j.tcs.2014.04.023560:P3(251-268)Online publication date: 4-Dec-2014
  • (2013)Deciding Schema k-Secrecy for XML DatabasesIEICE Transactions on Information and Systems10.1587/transinf.E96.D.1268E96.D:6(1268-1277)Online publication date: 2013
  • (2013)Rewrite Closure and CF Hedge AutomataLanguage and Automata Theory and Applications10.1007/978-3-642-37064-9_33(371-382)Online publication date: 2013
  • (2012)Automata-based Static Analysis of XML Document AdaptationElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.96.796(85-98)Online publication date: 7-Oct-2012
  • (2012)Consistency and repair for XML write-access control policiesThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-012-0273-y21:6(843-867)Online publication date: 1-Dec-2012
  • (2012)Static analysis of XML document adaptationsProceedings of the 2012 international conference on Advances in Conceptual Modeling10.1007/978-3-642-33999-8_8(57-66)Online publication date: 15-Oct-2012
  • (2011)Controlled term rewritingProceedings of the 8th international conference on Frontiers of combining systems10.5555/2050784.2050799(179-194)Online publication date: 5-Oct-2011
  • (2011)Computational complexity of the problem of tree generation under fine-grained access control policiesInformation and Computation10.1016/j.ic.2010.11.019209:3(548-567)Online publication date: 1-Mar-2011

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media